idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
30,552
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_apic_set_version(struct kvm_vcpu *vcpu) { struct kvm_lapic *apic = vcpu->arch.apic; struct kvm_cpuid_entry2 *feat; u32 v = APIC_VERSION; if (!kvm_vcpu_has_lapic(vcpu)) return; feat = kvm_find_cpuid_entry(apic->vcpu, 0x1, 0); if (feat && (feat->ecx & (1 << (X86_FEATURE_X2APIC & 31)))) v |= APIC_LVR_...
246,479,005,438,026,440,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,553
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_apic_update_irr(struct kvm_vcpu *vcpu, u32 *pir) { u32 i, pir_val; struct kvm_lapic *apic = vcpu->arch.apic; for (i = 0; i <= 7; i++) { pir_val = xchg(&pir[i], 0); if (pir_val) *((u32 *)(apic->regs + APIC_IRR + i * 0x10)) |= pir_val; } }
155,964,402,372,067,780,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,554
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_apic_update_tmr(struct kvm_vcpu *vcpu, u32 *tmr) { struct kvm_lapic *apic = vcpu->arch.apic; int i; for (i = 0; i < 8; i++) apic_set_reg(apic, APIC_TMR + 0x10 * i, tmr[i]); }
300,865,279,322,535,400,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,555
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
int kvm_create_lapic(struct kvm_vcpu *vcpu) { struct kvm_lapic *apic; ASSERT(vcpu != NULL); apic_debug("apic_init %d\n", vcpu->vcpu_id); apic = kzalloc(sizeof(*apic), GFP_KERNEL); if (!apic) goto nomem; vcpu->arch.apic = apic; apic->regs = (void *)get_zeroed_page(GFP_KERNEL); if (!apic->regs) { printk(K...
3,101,215,506,497,670,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,556
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_free_lapic(struct kvm_vcpu *vcpu) { struct kvm_lapic *apic = vcpu->arch.apic; if (!vcpu->arch.apic) return; hrtimer_cancel(&apic->lapic_timer.timer); if (!(vcpu->arch.apic_base & MSR_IA32_APICBASE_ENABLE)) static_key_slow_dec_deferred(&apic_hw_disabled); if (!(kvm_apic_get_reg(apic, APIC_SPIV) & A...
189,717,070,513,738,200,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,557
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
int kvm_get_apic_interrupt(struct kvm_vcpu *vcpu) { int vector = kvm_apic_has_interrupt(vcpu); struct kvm_lapic *apic = vcpu->arch.apic; if (vector == -1) return -1; apic_set_isr(vector, apic); apic_update_ppr(apic); apic_clear_irr(vector, apic); return vector; }
26,757,287,029,205,107,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,558
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
u64 kvm_get_lapic_tscdeadline_msr(struct kvm_vcpu *vcpu) { struct kvm_lapic *apic = vcpu->arch.apic; if (!kvm_vcpu_has_lapic(vcpu) || apic_lvtt_oneshot(apic) || apic_lvtt_period(apic)) return 0; return apic->lapic_timer.tscdeadline; }
329,845,988,517,199,860,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,559
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
int kvm_hv_vapic_msr_read(struct kvm_vcpu *vcpu, u32 reg, u64 *data) { struct kvm_lapic *apic = vcpu->arch.apic; u32 low, high = 0; if (!kvm_vcpu_has_lapic(vcpu)) return 1; if (apic_reg_read(apic, reg, 4, &low)) return 1; if (reg == APIC_ICR) apic_reg_read(apic, APIC_ICR2, 4, &high); *data = (((u64)high)...
96,139,432,032,281,370,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,560
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
int kvm_hv_vapic_msr_write(struct kvm_vcpu *vcpu, u32 reg, u64 data) { struct kvm_lapic *apic = vcpu->arch.apic; if (!kvm_vcpu_has_lapic(vcpu)) return 1; /* if this is ICR write vector before command */ if (reg == APIC_ICR) apic_reg_write(apic, APIC_ICR2, (u32)(data >> 32)); return apic_reg_write(apic, reg, ...
284,928,325,657,344,700,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,561
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static void kvm_ioapic_send_eoi(struct kvm_lapic *apic, int vector) { if (!(kvm_apic_get_reg(apic, APIC_SPIV) & APIC_SPIV_DIRECTED_EOI) && kvm_ioapic_handles_vector(apic->vcpu->kvm, vector)) { int trigger_mode; if (apic_test_vector(vector, apic->regs + APIC_TMR)) trigger_mode = IOAPIC_LEVEL_TRIG; else ...
237,193,562,473,635,770,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,562
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
bool kvm_irq_delivery_to_apic_fast(struct kvm *kvm, struct kvm_lapic *src, struct kvm_lapic_irq *irq, int *r, unsigned long *dest_map) { struct kvm_apic_map *map; unsigned long bitmap = 1; struct kvm_lapic **dst; int i; bool ret = false; *r = -1; if (irq->shorthand == APIC_DEST_SELF) { *r = kvm_apic_set_ir...
81,689,624,692,822,160,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,563
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
int kvm_lapic_enable_pv_eoi(struct kvm_vcpu *vcpu, u64 data) { u64 addr = data & ~KVM_MSR_ENABLED; if (!IS_ALIGNED(addr, 4)) return 1; vcpu->arch.pv_eoi.msr_val = data; if (!pv_eoi_enabled(vcpu)) return 0; return kvm_gfn_to_hva_cache_init(vcpu->kvm, &vcpu->arch.pv_eoi.data, addr, sizeof(u8)); }
95,302,212,080,343,370,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,564
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
u64 kvm_lapic_get_cr8(struct kvm_vcpu *vcpu) { u64 tpr; if (!kvm_vcpu_has_lapic(vcpu)) return 0; tpr = (u64) kvm_apic_get_reg(vcpu->arch.apic, APIC_TASKPRI); return (tpr & 0xf0) >> 4; }
311,275,152,871,652,720,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,565
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_lapic_init(void) { /* do not patch jump label more than once per second */ jump_label_rate_limit(&apic_hw_disabled, HZ); jump_label_rate_limit(&apic_sw_disabled, HZ); }
339,245,636,811,292,500,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,566
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_lapic_reset(struct kvm_vcpu *vcpu) { struct kvm_lapic *apic; int i; apic_debug("%s\n", __func__); ASSERT(vcpu); apic = vcpu->arch.apic; ASSERT(apic != NULL); /* Stop the timer in case it's a reset to an active apic */ hrtimer_cancel(&apic->lapic_timer.timer); kvm_apic_set_id(apic, vcpu->vcpu_id); ...
126,245,697,009,321,190,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,567
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_lapic_set_eoi(struct kvm_vcpu *vcpu) { if (kvm_vcpu_has_lapic(vcpu)) apic_reg_write(vcpu->arch.apic, APIC_EOI, 0); }
41,971,686,656,134,330,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,568
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_lapic_set_tpr(struct kvm_vcpu *vcpu, unsigned long cr8) { struct kvm_lapic *apic = vcpu->arch.apic; if (!kvm_vcpu_has_lapic(vcpu)) return; apic_set_tpr(apic, ((cr8 & 0x0f) << 4) | (kvm_apic_get_reg(apic, APIC_TASKPRI) & 4)); }
229,351,002,139,449,040,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,569
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
int kvm_lapic_set_vapic_addr(struct kvm_vcpu *vcpu, gpa_t vapic_addr) { if (vapic_addr) { if (kvm_gfn_to_hva_cache_init(vcpu->kvm, &vcpu->arch.apic->vapic_cache, vapic_addr, sizeof(u32))) return -EINVAL; __set_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention); } else { __clear_bit(KVM_APIC_CHEC...
260,078,683,201,637,850,000,000,000,000,000,000,000
lapic.c
254,914,464,310,514,520,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,570
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_lapic_sync_from_vapic(struct kvm_vcpu *vcpu) { u32 data; if (test_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention)) apic_sync_pv_eoi_from_guest(vcpu, vcpu->arch.apic); if (!test_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention)) return; kvm_read_guest_cached(vcpu->kvm, &vcpu->arch.apic->...
175,716,106,189,800,570,000,000,000,000,000,000,000
lapic.c
117,888,982,784,563,870,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,571
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
void kvm_lapic_sync_to_vapic(struct kvm_vcpu *vcpu) { u32 data, tpr; int max_irr, max_isr; struct kvm_lapic *apic = vcpu->arch.apic; apic_sync_pv_eoi_to_guest(vcpu, apic); if (!test_bit(KVM_APIC_CHECK_VAPIC, &vcpu->arch.apic_attention)) return; tpr = kvm_apic_get_reg(apic, APIC_TASKPRI) & 0xff; max_irr = ap...
53,382,882,967,839,710,000,000,000,000,000,000,000
lapic.c
117,888,982,784,563,870,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,572
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
int kvm_x2apic_msr_read(struct kvm_vcpu *vcpu, u32 msr, u64 *data) { struct kvm_lapic *apic = vcpu->arch.apic; u32 reg = (msr - APIC_BASE_MSR) << 4, low, high = 0; if (!irqchip_in_kernel(vcpu->kvm) || !apic_x2apic_mode(apic)) return 1; if (apic_reg_read(apic, reg, 4, &low)) return 1; if (msr == 0x830) apic...
305,470,346,221,218,200,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,573
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
int kvm_x2apic_msr_write(struct kvm_vcpu *vcpu, u32 msr, u64 data) { struct kvm_lapic *apic = vcpu->arch.apic; u32 reg = (msr - APIC_BASE_MSR) << 4; if (!irqchip_in_kernel(vcpu->kvm) || !apic_x2apic_mode(apic)) return 1; /* if this is ICR write vector before command */ if (msr == 0x830) apic_reg_write(apic, ...
66,660,052,514,001,630,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,574
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static bool lapic_is_periodic(struct kvm_lapic *apic) { return apic_lvtt_period(apic); }
51,234,389,899,268,895,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,575
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static void pv_eoi_clr_pending(struct kvm_vcpu *vcpu) { if (pv_eoi_put_user(vcpu, KVM_PV_EOI_DISABLED) < 0) { apic_debug("Can't clear EOI MSR value: 0x%llx\n", (unsigned long long)vcpi->arch.pv_eoi.msr_val); return; } __clear_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention); }
177,077,572,970,786,300,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,576
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static inline bool pv_eoi_enabled(struct kvm_vcpu *vcpu) { return vcpu->arch.pv_eoi.msr_val & KVM_MSR_ENABLED; }
67,806,500,498,077,680,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,577
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static bool pv_eoi_get_pending(struct kvm_vcpu *vcpu) { u8 val; if (pv_eoi_get_user(vcpu, &val) < 0) apic_debug("Can't read EOI MSR value: 0x%llx\n", (unsigned long long)vcpi->arch.pv_eoi.msr_val); return val & 0x1; }
67,259,999,783,779,070,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,578
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static int pv_eoi_put_user(struct kvm_vcpu *vcpu, u8 val) { return kvm_write_guest_cached(vcpu->kvm, &vcpu->arch.pv_eoi.data, &val, sizeof(val)); }
336,093,269,242,239,800,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,579
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static void pv_eoi_set_pending(struct kvm_vcpu *vcpu) { if (pv_eoi_put_user(vcpu, KVM_PV_EOI_ENABLED) < 0) { apic_debug("Can't set EOI MSR value: 0x%llx\n", (unsigned long long)vcpi->arch.pv_eoi.msr_val); return; } __set_bit(KVM_APIC_PV_EOI_PENDING, &vcpu->arch.apic_attention); }
226,669,375,364,756,950,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,580
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static inline void report_tpr_access(struct kvm_lapic *apic, bool write) { if (apic->vcpu->arch.tpr_access_reporting) __report_tpr_access(apic, write); }
214,425,639,298,251,360,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,581
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static void start_apic_timer(struct kvm_lapic *apic) { ktime_t now; atomic_set(&apic->lapic_timer.pending, 0); if (apic_lvtt_period(apic) || apic_lvtt_oneshot(apic)) { /* lapic timer in oneshot or periodic mode */ now = apic->lapic_timer.timer.base->get_time(); apic->lapic_timer.period = (u64)kvm_apic_get_reg...
288,592,932,918,996,150,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,582
linux
17d68b763f09a9ce824ae23eb62c9efc57b69271
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/17d68b763f09a9ce824ae23eb62c9efc57b69271
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376) A guest can cause a BUG_ON() leading to a host kernel crash. When the guest writes to the ICR to request an IPI, while in x2apic mode the following things happen, the destination is read from ICR2, which is a register that the guest can control. kvm_irq_...
0
static inline struct kvm_lapic *to_lapic(struct kvm_io_device *dev) { return container_of(dev, struct kvm_lapic, dev); }
59,358,282,137,100,840,000,000,000,000,000,000,000
lapic.c
190,243,646,842,195,860,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-6376
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
https://nvd.nist.gov/vuln/detail/CVE-2013-6376
30,739
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static int ssl3_prf( unsigned char *secret, size_t slen, char *label, unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen ) { size_t i; md5_context md5; sha1_context sha1; unsigned char padding[16]; unsigned char sha1sum[20]; ((void)la...
259,145,367,566,498,740,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,740
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_calc_finished_ssl( ssl_context *ssl, unsigned char *buf, int from ) { const char *sender; md5_context md5; sha1_context sha1; unsigned char padbuf[48]; unsigned char md5sum[16]; unsigned char sha1sum[20]; ssl_session *session = ssl->session_negotiate; i...
227,797,140,100,927,560,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,741
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_calc_finished_tls( ssl_context *ssl, unsigned char *buf, int from ) { int len = 12; const char *sender; md5_context md5; sha1_context sha1; unsigned char padbuf[36]; ssl_session *session = ssl->session_negotiate; if( !session ) session = ssl->session...
258,313,168,734,153,230,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,742
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_calc_finished_tls_sha256( ssl_context *ssl, unsigned char *buf, int from ) { int len = 12; const char *sender; sha2_context sha2; unsigned char padbuf[32]; ssl_session *session = ssl->session_negotiate; if( !session ) session = ssl->session; SSL_DEBU...
32,539,421,284,916,230,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,743
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_calc_verify_ssl( ssl_context *ssl, unsigned char hash[36] ) { md5_context md5; sha1_context sha1; unsigned char pad_1[48]; unsigned char pad_2[48]; SSL_DEBUG_MSG( 2, ( "=> calc verify ssl" ) ); memcpy( &md5 , &ssl->handshake->fin_md5 , sizeof(md5_context) ); memcpy( &sha1, &ssl->...
327,812,754,577,999,740,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,744
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_calc_verify_tls( ssl_context *ssl, unsigned char hash[36] ) { md5_context md5; sha1_context sha1; SSL_DEBUG_MSG( 2, ( "=> calc verify tls" ) ); memcpy( &md5 , &ssl->handshake->fin_md5 , sizeof(md5_context) ); memcpy( &sha1, &ssl->handshake->fin_sha1, sizeof(sha1_context) ); md5_fin...
44,879,641,869,542,630,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,745
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_close_notify( ssl_context *ssl ) { int ret; SSL_DEBUG_MSG( 2, ( "=> write close notify" ) ); if( ( ret = ssl_flush_output( ssl ) ) != 0 ) { SSL_DEBUG_RET( 1, "ssl_flush_output", ret ); return( ret ); } if( ssl->state == SSL_HANDSHAKE_OVER ) { if( ( ret = ss...
316,442,855,252,244,970,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,746
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static int ssl_compress_buf( ssl_context *ssl ) { int ret; unsigned char *msg_post = ssl->out_msg; size_t len_pre = ssl->out_msglen; unsigned char *msg_pre; SSL_DEBUG_MSG( 2, ( "=> compress buf" ) ); msg_pre = (unsigned char*) malloc( len_pre ); if( msg_pre == NULL ) { SSL_DEBU...
13,347,279,008,671,154,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,747
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static int ssl_decompress_buf( ssl_context *ssl ) { int ret; unsigned char *msg_post = ssl->in_msg; size_t len_pre = ssl->in_msglen; unsigned char *msg_pre; SSL_DEBUG_MSG( 2, ( "=> decompress buf" ) ); msg_pre = (unsigned char*) malloc( len_pre ); if( msg_pre == NULL ) { SSL_DE...
192,281,112,598,116,300,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,748
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static int ssl_decrypt_buf( ssl_context *ssl ) { size_t i, padlen = 0, correct = 1; unsigned char tmp[POLARSSL_SSL_MAX_MAC_SIZE]; SSL_DEBUG_MSG( 2, ( "=> decrypt buf" ) ); if( ssl->in_msglen < ssl->transform_in->minlen ) { SSL_DEBUG_MSG( 1, ( "in_msglen (%d) < minlen (%d)", ...
324,559,861,489,770,400,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,749
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_derive_keys( ssl_context *ssl ) { unsigned char tmp[64]; unsigned char keyblk[256]; unsigned char *key1; unsigned char *key2; unsigned int iv_copy_len; ssl_session *session = ssl->session_negotiate; ssl_transform *transform = ssl->transform_negotiate; ssl_handshake_params *handsh...
213,361,960,690,587,900,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,750
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_fetch_input( ssl_context *ssl, size_t nb_want ) { int ret; size_t len; SSL_DEBUG_MSG( 2, ( "=> fetch input" ) ); while( ssl->in_left < nb_want ) { len = nb_want - ssl->in_left; ret = ssl->f_recv( ssl->p_recv, ssl->in_hdr + ssl->in_left, len ); SSL_DEBUG_MSG( 2, ( "...
206,222,106,503,176,000,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,751
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_flush_output( ssl_context *ssl ) { int ret; unsigned char *buf; SSL_DEBUG_MSG( 2, ( "=> flush output" ) ); while( ssl->out_left > 0 ) { SSL_DEBUG_MSG( 2, ( "message length: %d, out_left: %d", 5 + ssl->out_msglen, ssl->out_left ) ); if( ssl->out_msgle...
216,298,202,556,168,400,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,752
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_free( ssl_context *ssl ) { SSL_DEBUG_MSG( 2, ( "=> free" ) ); free( ssl->ciphersuites ); if( ssl->out_ctr != NULL ) { memset( ssl->out_ctr, 0, SSL_BUFFER_LEN ); free( ssl->out_ctr ); } if( ssl->in_ctr != NULL ) { memset( ssl->in_ctr, 0, SSL_BUFFER_LEN );...
133,279,378,646,131,520,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,753
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
size_t ssl_get_bytes_avail( const ssl_context *ssl ) { return( ssl->in_offt == NULL ? 0 : ssl->in_msglen ); }
301,497,466,310,536,460,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,754
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
const char *ssl_get_ciphersuite( const ssl_context *ssl ) { if( ssl == NULL || ssl->session == NULL ) return NULL; return ssl_get_ciphersuite_name( ssl->session->ciphersuite ); }
64,991,780,047,319,520,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,755
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_get_ciphersuite_id( const char *ciphersuite_name ) { #if defined(POLARSSL_ARC4_C) if (0 == strcasecmp(ciphersuite_name, "TLS-RSA-WITH-RC4-128-MD5")) return( TLS_RSA_WITH_RC4_128_MD5 ); if (0 == strcasecmp(ciphersuite_name, "TLS-RSA-WITH-RC4-128-SHA")) return( TLS_RSA_WITH_RC4_128_SHA ); ...
327,899,388,082,532,320,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,756
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
const char *ssl_get_ciphersuite_name( const int ciphersuite_id ) { switch( ciphersuite_id ) { #if defined(POLARSSL_ARC4_C) case TLS_RSA_WITH_RC4_128_MD5: return( "TLS-RSA-WITH-RC4-128-MD5" ); case TLS_RSA_WITH_RC4_128_SHA: return( "TLS-RSA-WITH-RC4-128-SHA" ); #endif #i...
218,027,159,527,620,100,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,757
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_get_verify_result( const ssl_context *ssl ) { return( ssl->verify_result ); }
164,424,942,396,600,880,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,758
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
const char *ssl_get_version( const ssl_context *ssl ) { switch( ssl->minor_ver ) { case SSL_MINOR_VERSION_0: return( "SSLv3.0" ); case SSL_MINOR_VERSION_1: return( "TLSv1.0" ); case SSL_MINOR_VERSION_2: return( "TLSv1.1" ); case SSL_MINOR_VE...
195,778,728,159,846,000,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,759
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_handshake( ssl_context *ssl ) { int ret = 0; SSL_DEBUG_MSG( 2, ( "=> handshake" ) ); while( ssl->state != SSL_HANDSHAKE_OVER ) { ret = ssl_handshake_step( ssl ); if( ret != 0 ) break; } SSL_DEBUG_MSG( 2, ( "<= handshake" ) ); return( ret ); }
99,268,883,309,858,630,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,760
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_handshake_free( ssl_handshake_params *handshake ) { #if defined(POLARSSL_DHM_C) dhm_free( &handshake->dhm_ctx ); #endif memset( handshake, 0, sizeof( ssl_handshake_params ) ); }
71,507,345,840,980,760,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,761
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_handshake_step( ssl_context *ssl ) { int ret = POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE; #if defined(POLARSSL_SSL_CLI_C) if( ssl->endpoint == SSL_IS_CLIENT ) ret = ssl_handshake_client_step( ssl ); #endif #if defined(POLARSSL_SSL_SRV_C) if( ssl->endpoint == SSL_IS_SERVER ) ret = ssl_ha...
324,812,929,924,490,250,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,762
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_handshake_wrapup( ssl_context *ssl ) { SSL_DEBUG_MSG( 3, ( "=> handshake wrapup" ) ); /* * Free our handshake params */ ssl_handshake_free( ssl->handshake ); free( ssl->handshake ); ssl->handshake = NULL; /* * Switch in our now active transform context */ if( s...
28,844,948,796,686,927,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,763
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_init( ssl_context *ssl ) { int ret; int len = SSL_BUFFER_LEN; memset( ssl, 0, sizeof( ssl_context ) ); /* * Sane defaults */ ssl->rsa_decrypt = ssl_rsa_decrypt; ssl->rsa_sign = ssl_rsa_sign; ssl->rsa_key_len = ssl_rsa_key_len; ssl->min_major_ver = SSL_MAJOR_VERSION_3...
79,835,671,093,987,590,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,764
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_legacy_renegotiation( ssl_context *ssl, int allow_legacy ) { ssl->allow_legacy_renegotiation = allow_legacy; }
120,063,536,234,318,680,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,765
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_mac_md5( unsigned char *secret, unsigned char *buf, size_t len, unsigned char *ctr, int type ) { unsigned char header[11]; unsigned char padding[48]; md5_context md5; memcpy( header, ctr, 8 ); header[ 8] = (unsigned char) type; ...
192,546,140,426,189,430,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,766
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_mac_sha1( unsigned char *secret, unsigned char *buf, size_t len, unsigned char *ctr, int type ) { unsigned char header[11]; unsigned char padding[40]; sha1_context sha1; memcpy( header, ctr, 8 ); header[ 8] = (unsigned char) type;...
202,103,806,524,427,270,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,767
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_mac_sha2( unsigned char *secret, unsigned char *buf, size_t len, unsigned char *ctr, int type ) { unsigned char header[11]; unsigned char padding[32]; sha2_context sha2; memcpy( header, ctr, 8 ); header[ 8] = (unsigned char) type;...
182,159,895,322,115,240,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,768
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_parse_finished( ssl_context *ssl ) { int ret; unsigned int hash_len; unsigned char buf[36]; SSL_DEBUG_MSG( 2, ( "=> parse finished" ) ); ssl->handshake->calc_finished( ssl, buf, ssl->endpoint ^ 1 ); /* * Switch to our negotiated transform and session parameters for inbound data. ...
140,047,456,660,971,160,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,769
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_read( ssl_context *ssl, unsigned char *buf, size_t len ) { int ret; size_t n; SSL_DEBUG_MSG( 2, ( "=> read" ) ); if( ssl->state != SSL_HANDSHAKE_OVER ) { if( ( ret = ssl_handshake( ssl ) ) != 0 ) { SSL_DEBUG_RET( 1, "ssl_handshake", ret ); return( re...
35,555,891,539,156,640,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,770
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_renegotiate( ssl_context *ssl ) { int ret; SSL_DEBUG_MSG( 2, ( "=> renegotiate" ) ); if( ssl->state != SSL_HANDSHAKE_OVER ) return( POLARSSL_ERR_SSL_BAD_INPUT_DATA ); ssl->state = SSL_HELLO_REQUEST; ssl->renegotiation = SSL_RENEGOTIATION; if( ( ret = ssl_handshake_init( ssl )...
231,119,823,509,297,940,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,771
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static int ssl_rsa_decrypt( void *ctx, int mode, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len ) { return rsa_pkcs1_decrypt( (rsa_context *) ctx, mode, olen, input, output, output_max_len ); }
112,059,249,524,316,280,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,772
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_send_alert_message( ssl_context *ssl, unsigned char level, unsigned char message ) { int ret; SSL_DEBUG_MSG( 2, ( "=> send alert message" ) ); ssl->out_msgtype = SSL_MSG_ALERT; ssl->out_msglen = 2; ssl->out_msg[0] = level; ssl->ou...
282,416,651,076,434,130,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,773
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_send_fatal_handshake_failure( ssl_context *ssl ) { int ret; if( ( ret = ssl_send_alert_message( ssl, SSL_ALERT_LEVEL_FATAL, SSL_ALERT_MSG_HANDSHAKE_FAILURE ) ) != 0 ) { return( ret ); } return( 0 ); }
95,385,421,500,574,970,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,774
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_session_free( ssl_session *session ) { if( session->peer_cert != NULL ) { x509_free( session->peer_cert ); free( session->peer_cert ); } memset( session, 0, sizeof( ssl_session ) ); }
134,139,395,177,400,580,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,775
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_session_reset( ssl_context *ssl ) { int ret; ssl->state = SSL_HELLO_REQUEST; ssl->renegotiation = SSL_INITIAL_HANDSHAKE; ssl->secure_renegotiation = SSL_LEGACY_RENEGOTIATION; ssl->verify_data_len = 0; memset( ssl->own_verify_data, 0, 36 ); memset( ssl->peer_verify_data, 0, 36 ); ...
273,629,298,303,821,700,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,776
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_authmode( ssl_context *ssl, int authmode ) { ssl->authmode = authmode; }
286,525,047,736,391,760,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,777
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_bio( ssl_context *ssl, int (*f_recv)(void *, unsigned char *, size_t), void *p_recv, int (*f_send)(void *, const unsigned char *, size_t), void *p_send ) { ssl->f_recv = f_recv; ssl->f_send = f_send; ssl->p_recv = p_recv; ssl->p_send = p_send; }
140,771,396,698,528,730,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,778
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_ca_chain( ssl_context *ssl, x509_cert *ca_chain, x509_crl *ca_crl, const char *peer_cn ) { ssl->ca_chain = ca_chain; ssl->ca_crl = ca_crl; ssl->peer_cn = peer_cn; }
229,780,259,454,432,070,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,779
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_ciphersuites( ssl_context *ssl, const int *ciphersuites ) { ssl->ciphersuites[SSL_MINOR_VERSION_0] = ciphersuites; ssl->ciphersuites[SSL_MINOR_VERSION_1] = ciphersuites; ssl->ciphersuites[SSL_MINOR_VERSION_2] = ciphersuites; ssl->ciphersuites[SSL_MINOR_VERSION_3] = ciphersuites; }
26,444,550,735,912,928,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,780
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_ciphersuites_for_version( ssl_context *ssl, const int *ciphersuites, int major, int minor ) { if( major != SSL_MAJOR_VERSION_3 ) return; if( minor < SSL_MINOR_VERSION_0 || minor > SSL_MINOR_VERSION_3 ) return; ssl->ciphersuites[minor] = c...
318,826,175,968,819,340,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,781
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_set_dh_param( ssl_context *ssl, const char *dhm_P, const char *dhm_G ) { int ret; if( ( ret = mpi_read_string( &ssl->dhm_P, 16, dhm_P ) ) != 0 ) { SSL_DEBUG_RET( 1, "mpi_read_string", ret ); return( ret ); } if( ( ret = mpi_read_string( &ssl->dhm_G, 16, dhm_G ) ) != 0 ) ...
134,217,684,973,095,220,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,782
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_set_dh_param_ctx( ssl_context *ssl, dhm_context *dhm_ctx ) { int ret; if( ( ret = mpi_copy(&ssl->dhm_P, &dhm_ctx->P) ) != 0 ) { SSL_DEBUG_RET( 1, "mpi_copy", ret ); return( ret ); } if( ( ret = mpi_copy(&ssl->dhm_G, &dhm_ctx->G) ) != 0 ) { SSL_DEBUG_RET( 1, "mpi...
63,429,767,597,537,330,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,783
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_endpoint( ssl_context *ssl, int endpoint ) { ssl->endpoint = endpoint; }
66,484,119,641,992,080,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,784
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_set_hostname( ssl_context *ssl, const char *hostname ) { if( hostname == NULL ) return( POLARSSL_ERR_SSL_BAD_INPUT_DATA ); ssl->hostname_len = strlen( hostname ); ssl->hostname = (unsigned char *) malloc( ssl->hostname_len + 1 ); if( ssl->hostname == NULL ) return( POLARSSL_ERR...
262,584,988,433,910,500,000,000,000,000,000,000,000
ssl_tls.c
176,090,796,145,832,660,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,785
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_max_version( ssl_context *ssl, int major, int minor ) { ssl->max_major_ver = major; ssl->max_minor_ver = minor; }
39,178,261,474,011,243,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,786
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_min_version( ssl_context *ssl, int major, int minor ) { ssl->min_major_ver = major; ssl->min_minor_ver = minor; }
50,381,904,732,196,520,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,787
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_own_cert( ssl_context *ssl, x509_cert *own_cert, rsa_context *rsa_key ) { ssl->own_cert = own_cert; ssl->rsa_key = rsa_key; }
121,269,220,887,999,350,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,788
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_own_cert_alt( ssl_context *ssl, x509_cert *own_cert, void *rsa_key, rsa_decrypt_func rsa_decrypt, rsa_sign_func rsa_sign, rsa_key_len_func rsa_key_len ) { ssl->own_cert = own_cert; ssl->rsa...
255,062,567,071,688,650,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,789
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_renegotiation( ssl_context *ssl, int renegotiation ) { ssl->disable_renegotiation = renegotiation; }
140,712,048,915,129,100,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,790
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_rng( ssl_context *ssl, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ) { ssl->f_rng = f_rng; ssl->p_rng = p_rng; }
36,349,515,152,057,727,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,791
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_session( ssl_context *ssl, const ssl_session *session ) { memcpy( ssl->session_negotiate, session, sizeof(ssl_session) ); ssl->handshake->resume = 1; }
236,903,782,807,480,900,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,792
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_set_verify( ssl_context *ssl, int (*f_vrfy)(void *, x509_cert *, int, int *), void *p_vrfy ) { ssl->f_vrfy = f_vrfy; ssl->p_vrfy = p_vrfy; }
174,599,036,394,051,440,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,793
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
void ssl_transform_free( ssl_transform *transform ) { #if defined(POLARSSL_ZLIB_SUPPORT) deflateEnd( &transform->ctx_deflate ); inflateEnd( &transform->ctx_inflate ); #endif memset( transform, 0, sizeof( ssl_transform ) ); }
155,092,129,908,125,770,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,794
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_update_checksum_md5sha1( ssl_context *ssl, unsigned char *buf, size_t len ) { md5_update( &ssl->handshake->fin_md5 , buf, len ); sha1_update( &ssl->handshake->fin_sha1, buf, len ); }
177,047,794,045,423,150,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,795
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_update_checksum_sha256( ssl_context *ssl, unsigned char *buf, size_t len ) { sha2_update( &ssl->handshake->fin_sha2, buf, len ); }
320,407,401,934,633,720,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,796
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_update_checksum_sha384( ssl_context *ssl, unsigned char *buf, size_t len ) { sha4_update( &ssl->handshake->fin_sha4, buf, len ); }
205,421,171,424,762,330,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,797
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static void ssl_update_checksum_start( ssl_context *ssl, unsigned char *buf, size_t len ) { md5_update( &ssl->handshake->fin_md5 , buf, len ); sha1_update( &ssl->handshake->fin_sha1, buf, len ); sha2_update( &ssl->handshake->fin_sha2, buf, len ); #if defined(POLARSSL_...
315,310,723,928,277,130,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,798
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_write( ssl_context *ssl, const unsigned char *buf, size_t len ) { int ret; size_t n; SSL_DEBUG_MSG( 2, ( "=> write" ) ); if( ssl->state != SSL_HANDSHAKE_OVER ) { if( ( ret = ssl_handshake( ssl ) ) != 0 ) { SSL_DEBUG_RET( 1, "ssl_handshake", ret ); re...
244,101,708,119,796,670,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,799
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_write_certificate( ssl_context *ssl ) { int ret; size_t i, n; const x509_cert *crt; SSL_DEBUG_MSG( 2, ( "=> write certificate" ) ); if( ssl->endpoint == SSL_IS_CLIENT ) { if( ssl->client_auth == 0 ) { SSL_DEBUG_MSG( 2, ( "<= skip write certificate" ) ); ...
238,990,133,467,170,130,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,800
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_write_change_cipher_spec( ssl_context *ssl ) { int ret; SSL_DEBUG_MSG( 2, ( "=> write change cipher spec" ) ); ssl->out_msgtype = SSL_MSG_CHANGE_CIPHER_SPEC; ssl->out_msglen = 1; ssl->out_msg[0] = 1; ssl->state++; if( ( ret = ssl_write_record( ssl ) ) != 0 ) { SSL_D...
132,635,433,928,187,030,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,801
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_write_finished( ssl_context *ssl ) { int ret, hash_len; SSL_DEBUG_MSG( 2, ( "=> write finished" ) ); ssl->handshake->calc_finished( ssl, ssl->out_msg + 4, ssl->endpoint ); hash_len = ( ssl->minor_ver == SSL_MINOR_VERSION_0 ) ? 36 : 12; ssl->verify_data_len = hash_len; memcpy( ssl->ow...
211,033,809,348,206,650,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,802
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
int ssl_write_record( ssl_context *ssl ) { int ret, done = 0; size_t len = ssl->out_msglen; SSL_DEBUG_MSG( 2, ( "=> write record" ) ); if( ssl->out_msgtype == SSL_MSG_HANDSHAKE ) { ssl->out_msg[1] = (unsigned char)( ( len - 4 ) >> 16 ); ssl->out_msg[2] = (unsigned char)( ( len - 4 ...
260,647,228,652,991,370,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,803
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static int tls1_prf( unsigned char *secret, size_t slen, char *label, unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen ) { size_t nb, hs; size_t i, j, k; unsigned char *S1, *S2; unsigned char tmp[128]; unsigned char h_i[20]; if( si...
28,278,213,366,835,244,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,804
polarssl
1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
ssl_parse_certificate() now calls x509parse_crt_der() directly
0
static int tls_prf_sha384( unsigned char *secret, size_t slen, char *label, unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen ) { size_t nb; size_t i, j, k; unsigned char tmp[128]; unsigned char h_i[48]; if( sizeof( tmp ) < ...
99,200,910,794,316,900,000,000,000,000,000,000,000
ssl_tls.c
193,081,241,478,287,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4623
The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certi...
https://nvd.nist.gov/vuln/detail/CVE-2013-4623
30,805
linux
12d6e7538e2d418c08f082b1b44ffa5fb7270ed8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8
KVM: perform an invalid memslot step for gpa base change PPC must flush all translations before the new memory slot is visible. Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com> Signed-off-by: Avi Kivity <avi@redhat.com>
0
static unsigned long __gfn_to_hva_many(struct kvm_memory_slot *slot, gfn_t gfn, gfn_t *nr_pages, bool write) { if (!slot || slot->flags & KVM_MEMSLOT_INVALID) return KVM_HVA_ERR_BAD; if (memslot_is_readonly(slot) && write) return KVM_HVA_ERR_RO_BAD; if (nr_pages) *nr_pages = slot->npages - (gfn - ...
270,707,010,617,178,200,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4592
Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.
https://nvd.nist.gov/vuln/detail/CVE-2013-4592
30,806
linux
12d6e7538e2d418c08f082b1b44ffa5fb7270ed8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8
KVM: perform an invalid memslot step for gpa base change PPC must flush all translations before the new memory slot is visible. Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com> Signed-off-by: Avi Kivity <avi@redhat.com>
0
static pfn_t __gfn_to_pfn(struct kvm *kvm, gfn_t gfn, bool atomic, bool *async, bool write_fault, bool *writable) { struct kvm_memory_slot *slot; if (async) *async = false; slot = gfn_to_memslot(kvm, gfn); return __gfn_to_pfn_memslot(slot, gfn, atomic, async, write_fault, writable); }
60,140,736,413,886,050,000,000,000,000,000,000,000
kvm_main.c
79,123,672,423,445,420,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4592
Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.
https://nvd.nist.gov/vuln/detail/CVE-2013-4592
30,807
linux
12d6e7538e2d418c08f082b1b44ffa5fb7270ed8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/12d6e7538e2d418c08f082b1b44ffa5fb7270ed8
KVM: perform an invalid memslot step for gpa base change PPC must flush all translations before the new memory slot is visible. Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com> Signed-off-by: Avi Kivity <avi@redhat.com>
0
__gfn_to_pfn_memslot(struct kvm_memory_slot *slot, gfn_t gfn, bool atomic, bool *async, bool write_fault, bool *writable) { unsigned long addr = __gfn_to_hva_many(slot, gfn, NULL, write_fault); if (addr == KVM_HVA_ERR_RO_BAD) return KVM_PFN_ERR_RO_FAULT; if (kvm_is_error_hva(addr)) return KVM_PFN_ERR_BA...
273,060,406,530,246,900,000,000,000,000,000,000,000
kvm_main.c
6,339,372,324,102,888,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4592
Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.
https://nvd.nist.gov/vuln/detail/CVE-2013-4592